People Are the Perimeter, We Need a Zero Trust Approach to Security

Data is the new oil—an observation not lost on hackers. In a world of growing interconnectivity, our most valuable digital assets—including our digital identities–have never been ...
Read More

3 Identity Access Management (IAM) deployment models

Each of the identity and access management platform deployment models-on-premises, cloud and hybrid-has trade-offs and different resource requirements. Source: CSO Identity and ...
Read More

Microsoft ADFS Vulnerability Lets Attackers Bypass MFA

The flaw lets an attacker use the same second factor to bypass multifactor authentication for any account on the same ADFS service. A newly discovered vulnerability in Microsoft's ...
Read More